It's not damaged, it is being damaged with malicious, exploitative ill intent. I've been trying to figure out how all this works to increase the thickness and layering of cyber security.. One day it'll end permanently

It is very possible unless you're actually experiencing being actively and presently remotely hacked yourself.. My theory the adversary poisoned the network and was able to install the keylogger, root kit programs and so whether there would be internet or not, device would be accessible. I installed and searched for these anti-virus, malware applications too late when the perpetrator already instilled the programs.

Sick perverted stalking adversary can see everything and anything that I'm doing in this device and what I'm typing is being recorded by key logging software, and so is able to anticipate and sabotage apps and w/e

Then who is TrustedInstaller (see attached) who is preventing me from making or reverting app's changes back to default normal settings, and I'm not even the grandest admin, that account is higher than me as an admin.

And I'm sure there are more, the majority of the population are just not aware and educated in this subject otherwise we will be able to prevent these breaches. Most people don't know they've been hacked, some malwares are very covert and its purpose is to conceal itself and not being detected. Heard stories other people were hacked for 2 years without even knowing it, they were being spied on and exploited, computers being used for DDos attacks and other purposes the adversary intends to do with it, w/e

My theory the adversary poisoned the network and was able to install the keylogger, root kit programs and so whether there would be internet or not, device would be accessible.

Has anyone else physical access to your computer ? If not, it can't be accessed from remote if not connected to the network.Besides, no rootkits are installed on your computer and FRST did not show the presence of keyloggers.

Quote

Then who is TrustedInstaller (see attached) who is preventing me from making or reverting app's changes back to default normal settings, and I'm not even the grandest admin, that account is higher than me as an admin.

Windows 10 changed the way permissions are granted and a "normal" Administrator account is limited. "Specials" accounts such as TrustedInstaller, SYSTEM, etc. are used to perform administrative tasks.

Quote

EDIT: See I searched around[...]

It concerns Windows XP and as I said above, users management changed since then.

Quote

In addition, maybe this is what happened all the way before this all even got started[...]

It your computer was compromised this way, there will be a clue with the FRST reports. By the way, the "Open with Application Issue" problem reported by CCleaner is not malicious.

Has anyone else physical access to your computer ? If not, it can't be accessed from remote if not connected to the network.Besides, no rootkits are installed on your computer and FRST did not show the presence of keyloggers.

I guess you don't understand Root Kits purpose and how they've been designed.